
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-44025 affects Roundcube versions before 1.3.17 and 1.4.x before 1.4.12. The vulnerability is a Cross-Site Scripting (XSS) issue that occurs in handling an attachment's filename extension when displaying a MIME type warning message (NVD, Debian Security).
The vulnerability is classified as a Cross-Site Scripting (XSS) issue with a CVSS v3.1 Base Score of 6.1 (MEDIUM) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue stems from improper sanitization of file extension data when displaying MIME type mismatch warnings, allowing potential injection of malicious HTML/JavaScript code (NVD, GitHub Issue).
The vulnerability allows attackers to perform Cross-Site Scripting (XSS) attacks through specially crafted attachment filename extensions. This could potentially lead to unauthorized access to user data and execution of arbitrary JavaScript code in the context of the user's browser session (Debian LTS).
The vulnerability has been fixed in Roundcube versions 1.3.17 and 1.4.12. Users are recommended to upgrade to these or later versions. The fix involves proper sanitization of file extension data using the rcube::Q() function for HTML escaping (GitHub Commit, Debian Security).
Multiple Linux distributions have released security advisories and patches for this vulnerability, including Debian and Fedora. Debian classified this as an important security issue and provided fixes for both stable and oldstable distributions (Debian Security, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."